期刊文献+

一种基于身份的代理盲签名 被引量:2

An ID-based proxy blind signature scheme
下载PDF
导出
摘要 代理签名与盲签名都是非常有用的密码学工具,在实际生活中有着广泛的应用。在代理签名中,原始签名人能将数字签名的权力委托给代理签名人;而在盲签名方案中,被签消息的内容对签名者是不可见的,签名被接受者得到后,签名者不能追踪签名。文中结合两者的优点,利用基于椭圆曲线上的Weil配对(WeilPairing)的双线性映射,在基于身份的数字签名的基础上,构造了一个基于ID的代理盲签名方案,并对其安全性进行了简要分析。 Proxy signature and blind signature are useful tools in cryptography. They both have wide applications in practice .With proxy signature, an original signatory can delegate his signing authority to a proxy signatory who signs a message on behalf of the original one. A blindly signed message cannot be known by the signatory who made the blind signature and the identity of the requester also cannot be traced. Based on bilinera projection of weil Pairing and an ID-based signature scheme, an ID-based proxy blind signature scheme was presented, which satisfies the security properties of both proxy signature scheme and blind signature scheme. A simple security analysis of the newly proposed scheme was also given.
作者 李素娟
出处 《南京工业大学学报(自然科学版)》 CAS 2005年第3期107-110,共4页 Journal of Nanjing Tech University(Natural Science Edition)
关键词 盲签名方案 WEIL配对 代理签名 数字签名 双线性映射 椭圆曲线 签名者 密码学 安全性 名人 ID-based bilinear paring Weil pairing proxy signature blind signature
  • 相关文献

参考文献10

  • 1Chaum D. Blind signature systems[A].Proceedings of the Cryp to 83[C].New York:Springer-Verlag,1998.153-156.
  • 2Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[A].Proceedings of the 3rd ACM Conference on Computer and communications Security[C].New Delhi:ACM Press,1996.48-57.
  • 3Silveman J H.The arithmetic of elliptic curves[M].New York:Springer-Verlag,1986.96-99.
  • 4Boneh D, Franklin M.Identity-based encryption from the weil pairing[A].Advance in Cryptology-CRYPTO 2001[C].New York: Springer-Verlag,2001.341-346.
  • 5Paterson K. ID-based signatures from pairing On elliptic curves[ EB/OL].http://epring.iacr.org.2002-10-01.
  • 6Hess F. Esponent group signature schemes and efficient identity based signature schemes based on pairing[EB/OL].http://epfint.iacr. org,2004-10-11.
  • 7Hess F, Seroussi G, Smart N.Two topics in hyperelliptic cryptography[A].SAC2001[C].New York:Springer-Berlag,2001,181-189.
  • 8Zhang F, Kim K. ID-based blind signature and ring signature from pairings[A].Advances in Cryptology-Asiacrypt 2002[C].New York: Springer-Verlag,2002.533-547.
  • 9王泽成,斯桃枝,李志斌,周振江.基于身份的代理签名和盲签名[J].计算机工程与应用,2003,39(23):148-150. 被引量:13
  • 10谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91

二级参考文献20

  • 1A Shamir.Identity-based cryptosystems and signature schemes[C].In: Proc Crypto 1984, LNCS ,Springer-Verlag, 1985 ; 196:47-53.
  • 2J H Silverman.The Arithmetic of Elliptic Curves[J].Graduate Texts in Mathematic, Springer-Verlag, 1986; 106:96-99.
  • 3D Boneh,M Franklin.Identity-Based Encryption from the Well pairing[C].In:Proc Crypto 2001 ,LNCS,Springer-Verlag,2001 ;2139:213-229.
  • 4F Hess.Exponent group signature schemes and efficient identity based signature schemes based on pairing.Available from http://eprint.iacr. org,2002.
  • 5K Paterson.ID-based signatures from pairing on elliptic curves.Available from http://epring.iacr.org,2002.
  • 6P S E M Barreto,H Y Kim.Efllcient algorithms for pairing-based cryptosystems.Available from http://eprint.iacr.org/,2002.
  • 7S D Galbraith.Supersingular curves in cryptography[C].In:Proc Asia-Crypt 2001 ,LNCS,Springer-Verlag,2001 ;2248:495-513.
  • 8Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 9Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 10Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.

共引文献102

同被引文献4

  • 1马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signature for Delegating Signing[C]//In Proc 3rd ACM Conference on Computer and Communications Security.New Delhi,India,New York:ACM Press,1996.
  • 3Chaum D.Blind signature systems[C] // Proceedings of the Crypto 83.New York:Springer-Verlag,1998:153-156.
  • 4Bonch D,Lynn B,Shacham H.Short signatures from the Weil pairing[C]// In:Advances in Cryptology-Asiacrypr 2001,Lecture Notes in Computer Science 2248.Heidelberg:Springer,2002:514-532.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部